Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

The new visa rule in the US requires from applicants to set privacy in social media for the public

June 24, 2025

Hackers focus on over 70 Microsoft Exchange servers to steal credentials via Keyloggers

June 24, 2025

Researchers find a way to close Cryptominer companies using bad stocks and Xmrogue

June 24, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Hackers operate incorrectly configured API Docker to hand over cryptocurrency via Tor Network
Global Security

Hackers operate incorrectly configured API Docker to hand over cryptocurrency via Tor Network

AdminBy AdminJune 24, 2025No Comments3 Mins Read
Docker APIs to Mine Cryptocurrency
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


June 24, 2025Red LakshmananCloud Security / Kryptoja

API DOCER to get cryptocurrency

Doker’s misconceptions are the purpose of the company that uses the Tor anonymity network to make the mining of the mine confidently shake under sensitive conditions.

“The attackers exploit incorrectly configured API Docker to access container conditions, and then using Tor to mask their activities when deploying crystals, Trend Micro Researchers Sunil Bharti and Shubham Singhh – Note in an analysis published last week.

When using Tor, the idea is to unanimized their origin during the mounting of the miner on the impaired systems. The attacks according to the cybersecurity campaign begin with the request with IP -DAS 198.199.72 ( List of all containers by car.

If there are no containers, the attacker continues to create a new, based on the “alpine” image and the secure catalog/hostrouut – that is, the root catalog (“https://thehackernews.com”) physical or virtual master’s virtual car – like Tom in it. This behavior creates safety risks because it allows the container to access and change the files and directory in the host system, which leads to the escape of the container.

Cybersecurity

Then the actors threatens perform a carefully organized sequence of action, which provide for the launch of the Base64 shell script to set up the Tor on the container as part of the request for creating and ultimately obtain and execute a deleted scenario from the .onion domain. (“WTXQF54DJHP5PSKV2LFYDUB5IEVXBYVLZGOPK6HXGE5UMBR63AD (.)

“This reflects the overall tactics used by the attackers to hide the team infrastructure and control (C&C), avoid detection and malware or miners in compromised cloud or container conditions,” the researchers said. “In addition, the attacker uses” Socks5h “to send all DNS traffic and permit through Tor to enhance anonymity and evasion.”

Once the container is created, the scenario “Docker-Init.sh” unfolds, which then checks the catalog “/hostruut, installed earlier, and changes the SSH system to install remote access by turning on the root and adding that controlled ~/.Sssh/Authorized_Keys.

Also found actor threats to install different tools like Masakan. libpcap. Zstdand touristsBeacon to server C&C, detail about the infected system, and ultimately deliver a binary that acts as a drip for the Xmrig cryptocurrency miner, as well as the necessary mining configuration, wallet and mining.

“This approach helps the attackers avoid detecting and simplifying the deployment in violated conditions,” said Trend Micro, adding that he observed the activities of technology companies, financial services and health care organizations.

Cybersecurity

The conclusions indicate continuing trend of cyber attacks which target incorrectly customized or poorly secured Cloud environments for cryptoje.

Development comes when Wiz found that the scanning of public code repositories revealed hundreds of proven secrets in the MCP.json, .env and AIG and Notebook Python (.ipynb), turning them into a treasure trove.

The cloud protective firm has stated that it found true secrets belonging to more than 30 companies and startups, including those owned by Fortune 100.

“In addition to just secrets, the code execution leads to the fact that Python’s laptops should be regarded as sensitive,” – researchers Shey Berkovich and Rami Makartky – Note. “Their content, if related to the developer’s organization, can provide intelligence for malicious subjects.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

The new visa rule in the US requires from applicants to set privacy in social media for the public

June 24, 2025

Hackers focus on over 70 Microsoft Exchange servers to steal credentials via Keyloggers

June 24, 2025

Researchers find a way to close Cryptominer companies using bad stocks and Xmrogue

June 24, 2025

APT28 uses signal chat to expand malicious Beardhell ​​and Testament software in Ukraine

June 24, 2025

Talk CTEM we all need

June 24, 2025

US House forbids WhatsApp on official security and protection devices

June 24, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

The new visa rule in the US requires from applicants to set privacy in social media for the public

June 24, 2025

Hackers focus on over 70 Microsoft Exchange servers to steal credentials via Keyloggers

June 24, 2025

Researchers find a way to close Cryptominer companies using bad stocks and Xmrogue

June 24, 2025

APT28 uses signal chat to expand malicious Beardhell ​​and Testament software in Ukraine

June 24, 2025

Talk CTEM we all need

June 24, 2025

Hackers operate incorrectly configured API Docker to hand over cryptocurrency via Tor Network

June 24, 2025

US House forbids WhatsApp on official security and protection devices

June 24, 2025

Salt Typhoon associated with China

June 24, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

The new visa rule in the US requires from applicants to set privacy in social media for the public

June 24, 2025

Hackers focus on over 70 Microsoft Exchange servers to steal credentials via Keyloggers

June 24, 2025

Researchers find a way to close Cryptominer companies using bad stocks and Xmrogue

June 24, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.